Description
The WowPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `wowpress` shortcode in all versions up to, and including, 1.0.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The WowPress plugin for WordPress contains a stored cross‑site scripting flaw in its wowpress shortcode. Because the plugin fails to properly sanitize and escape attributes supplied by users, an attacker who can create or edit content with contributor-level access or higher can embed arbitrary JavaScript into a shortcode. When other users view pages that contain the maliciously altered shortcode, the injected script is executed in their browsers, allowing attackers to steal credentials, hijack sessions, or deface content. The weakness is identified as CWE‑79, reflecting a classic input validation error.

Affected Systems

All releases of the WowPress plugin from the vendor theyeti up to and including version 1.0.0 are affected. WordPress sites that incorporate the wowpress shortcode in any of these versions are at risk.

Risk and Exploitability

The base score of 6.4 indicates moderate severity. No external exploitation probability data is available, suggesting a medium likelihood of attack. The vulnerability is not listed in the known exploited vulnerabilities catalog, but because it can execute arbitrary code in users’ browsers, the risk remains significant for sites that allow contributors or higher roles to edit content containing the shortcode. Attacks would require authenticated access that grants the ability to add or modify the shortcode attributes.

Generated by OpenCVE AI on April 8, 2026 at 08:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch for WowPress by upgrading to a version newer than 1.0.0 as soon as it becomes available
  • If an upgrade is not yet feasible, temporarily remove or disable the WowPress plugin to eliminate the attack surface
  • Restrict contributor-level and higher roles from adding or editing content that includes the wowpress shortcode
  • Search the site for pages that contain the malicious shortcode, remove any injected scripts, and verify that no other content has been compromised
  • Review other active plugins for similar unsanitized shortcode attribute vulnerabilities and apply necessary updates or workarounds

Generated by OpenCVE AI on April 8, 2026 at 08:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Theyeti
Theyeti wowpress
Wordpress
Wordpress wordpress
Vendors & Products Theyeti
Theyeti wowpress
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description The WowPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `wowpress` shortcode in all versions up to, and including, 1.0.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WowPress <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Theyeti Wowpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:25.368Z

Reserved: 2026-04-03T16:49:06.144Z

Link: CVE-2026-5508

cve-icon Vulnrichment

Updated: 2026-04-08T16:00:10.419Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T07:16:23.367

Modified: 2026-04-24T18:15:28.940

Link: CVE-2026-5508

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:43:41Z

Weaknesses